Skip to content

Commit fc23ea1

Browse files
1 parent d17c6dc commit fc23ea1

File tree

2 files changed

+7
-3
lines changed

2 files changed

+7
-3
lines changed

advisories/github-reviewed/2024/04/GHSA-9wmf-xf3h-r8pr/GHSA-9wmf-xf3h-r8pr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9wmf-xf3h-r8pr",
4-
"modified": "2024-10-16T17:06:11Z",
4+
"modified": "2025-10-24T19:33:18Z",
55
"published": "2024-04-25T18:30:39Z",
66
"aliases": [
77
"CVE-2024-1102"
@@ -48,6 +48,10 @@
4848
"type": "WEB",
4949
"url": "https://github.com/jberet/jsr352/commit/eeef999663d7da0e372aeeeac26ecf7201a3121d"
5050
},
51+
{
52+
"type": "WEB",
53+
"url": "https://access.redhat.com/errata/RHSA-2024:1677"
54+
},
5155
{
5256
"type": "WEB",
5357
"url": "https://access.redhat.com/errata/RHSA-2024:3580"

advisories/github-reviewed/2025/03/GHSA-v56r-hwv5-mxg6/GHSA-v56r-hwv5-mxg6.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v56r-hwv5-mxg6",
4-
"modified": "2025-03-27T18:02:14Z",
4+
"modified": "2025-10-24T19:32:06Z",
55
"published": "2025-03-27T18:02:14Z",
66
"aliases": [
77
"CVE-2025-30355"
88
],
99
"summary": "Synapse vulnerable to federation denial of service via malformed events",
10-
"details": "### Impact\nA malicious server can craft events which, when received, prevent Synapse version up to 1.127.0 from federating with other servers. The vulnerability has been exploited in the wild.\n\n### Patches\nFixed in Synapse v1.127.1.\n\n### Workarounds\nClosed federation environments of trusted servers or non-federating installations are not affected.\n\n### For more information\n\nIf you have any questions or comments about this advisory, please email us at [security at element.io](mailto:[email protected]).",
10+
"details": "### Impact\nA malicious server can craft events with a `depth` outside the integer range allowed by Canonical JSON. When such an event is received by Synapse version up to 1.127.0, it prevents it from federating with other servers. The vulnerability has been exploited in the wild.\n\n### Patches\nFixed in Synapse v1.127.1.\n\n### Workarounds\nClosed federation environments of trusted servers or non-federating installations are not affected.\n\n### For more information\n\nIf you have any questions or comments about this advisory, please email us at [security at element.io](mailto:[email protected]).",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",

0 commit comments

Comments
 (0)